GOOD DEEPFAKE
In the second season of BBC mystery thriller The Capture, deepfakes threaten the future of democracy and UK national security. In a dystopia set in present day London, hackers use AI to insert these highly realistic false images and videos of people into live news broadcasts to destroy the careers of politicians.
But my team’s research has shown how difficult it is to create convincing deepfakes in reality. In fact, technology and creative professionals have started collaborating on solutions to help people spot bogus videos of politicians and celebrities. We stand a decent chance of staying one step ahead of fraudsters.
In my research project, Virtual Maggie, I attempted to use deepfakes to digitally resurrect former UK prime minister Margaret Thatcher for a new drama. After months of work, we were unable to create a virtual Maggie acceptable for broadcast.
Producing convincing deepfakes in high definition requires top spec hardware, a lot of computer time, and human intervention to fix glitches in the output. This didn’t stop me enjoying The Capture, despite knowing that Ben Chanan’s drama was not a scenario likely to play out in the near future. Like every good dystopia, it had the seed of something that might one day be possible.
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.